Extend SCIM Provisioning with Okta to SkillUp

Last updated: November 5, 2025

SkillUp supports SCIM-based provisioning with Okta to automatically synchronize users, roles, and profile attributes. SkillUp and HackerRank for Work share the same SCIM endpoint and authentication mechanism. 

If you have not configured SCIM provisioning with Okta for HackerRank for Work, follow the Setting Up SCIM Provisioning with Okta for HackerRank for Work article first.

If your organization already uses SCIM provisioning with Okta for HackerRank for Work, you can extend the existing integration to include SkillUp users. You only need to update the attribute mappings in Okta to enable provisioning for SkillUp.

This article explains how to extend your HackerRank for Work–Okta integration to manage SkillUp users.

Prerequisites

Ensure that SAML-based SSO is already configured in HackerRank for Work. For more information, see 📄 Configure Single Sign-On (SSO) for SkillUp.

Updating attribute mappings for SkillUp

To extend your existing HackerRank for Work–Okta integration to manage SkillUp users:

  1. Log in to the Okta Admin Console.

  2. Go to Applications > HackerRank for Work.

    skillup.1.png
  3. Select the Provisioning tab.

  4. Update the mappings to include SkillUp-specific attributes.

    skillup1.png
    1. Modify existing attributes: Mark the following attributes as Not Required:

      • Role

      • Company Admin

      • Team Admin

    2. Add SkillUp attributes: Use the following table to add new SkillUp attributes.

      Display Name

      Variable Name

      Data Type

      Required

      Attribute Type

      Description

      Job Title

      job_title

      string

      Yes

      Personal

      Maps to the user’s job title in Okta

      Manager Email

      manager_email

      string

      Conditional

      Personal

      Maps to the manager’s email in Okta

      SkillUp Role

      skillup_role

      string (enum)

      Yes

      Group

      Defines the user’s access level in SkillUp

Use the namespace urn:ietf:params:scim:schemas:core:2.0:User for all new attributes.

Allowed values for SkillUp role

Display Name

Value

Individual

individual

Manager

manager

Admin

admin

Note:

  • job_title and skillUp_role are mandatory for all SkillUp users.

  • manager_email is mandatory for users with the Individual role.

  • To exclude a user from SkillUp provisioning, leave all SkillUp-specific attributes (manager_email, job_title, skillup_role) blank.

How SCIM provisioning works

After you update the attribute mappings, Okta automatically provisions SkillUp users using the same SCIM configuration as HackerRank for Work.

  • When you assign a user to the HackerRank for Work application in Okta, SkillUp automatically creates or updates their profile based on the assigned SkillUp Role. 

  • Attribute updates, such as job title, manager email, or skill-up role, synchronize in real-time.

  • When you deprovision a user in Okta, SkillUp automatically deactivates their account.

For more information on supported provisioning actions such as Push New Users, Push Profile Updates, and Import Users, see 📄 Setting Up SCIM Provisioning with Okta.

Note:

  • Use Okta as the system of record for user data and roles.

  • Verify that required attributes ( email, givenName, familyName) are mapped correctly.

  • If provisioning fails:

    • Confirm that the API key is valid.

    • Check that attribute names and namespaces match exactly.

    • Ensure that the HRW SCIM integration is active.